Report - 생활비지급.doc

Convert Image File VBA_macro MSOffice File PNG Format JPEG Format
ScreenShot
Created 2021.06.16 09:18 Machine s1_win7_x6402
Filename 생활비지급.doc
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 949, Autho
AI Score Not founds Behavior Score
4.4
ZERO API file : clean
VT API (file) 37 detected (malicious, high confidence, score, GenericOLE, Save, Valyria, Eldorado, a variant of VBA, 0NA103DQ21, Lazarus, BMPStegano, MRDT, Siggen13, OLE2, ASMacro, Tnega, ai score=100, Static AI, Malicious OLE)
md5 71759cca8c700646b4976b19b9abd6fe
sha256 79e15cc02c6359cdb84885f6b84facbf91f6df1254551750dd642ff96998db35
ssdeep 12288:CFtucWj0zEGUIj64n6yf1SZTtdOoMmDDOVy:as5YSg6yf6O96DOM
imphash
impfuzzy
  Network IP location

Signature (8cnts)

Level Description
danger File has been identified by 37 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Creates suspicious VBA object
watch Libraries known to be associated with a CVE were requested (may be False Positive)
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice Word document hooks document open

Rules (5cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
warning VBMacro_Convert_Image_File_Zero VBMacro Convert Image File binaries (upload)
info JPEG_Format_Zero JPEG Format binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info PNG_Format_Zero PNG Format binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure